handsomelky / Shamir-Image-Secret-SharingLinks
This repository contains an implementation of Shamir's Secret Sharing algorithm tailored for image files.
☆26Updated last year
Alternatives and similar repositories for Shamir-Image-Secret-Sharing
Users that are interested in Shamir-Image-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- ☆52Updated 3 years ago
- 全国密码技术竞赛论文 latex模板☆19Updated 3 months ago
- SOCI is a Secure Outsourced Computation on Integers based on the Paillier cryptosystem and a twin-server architecture☆102Updated 2 years ago
- SOCI is a Secure Outsourced Computation on Integers based on the Paillier cryptosystem and a twin-server architecture☆98Updated 2 years ago
- A page containing many useful links.☆26Updated last year
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆26Updated 2 years ago
- Python wrapper for the PBC (Pairing-Based Cryptography) library☆14Updated last week
- ☆16Updated 2 months ago
- SOCI is a Secure Outsourced Computation on Integers based on the Paillier cryptosystem and a twin-server architecture☆116Updated 2 years ago
- Cryptography course slides at Harbin Institute of Technology☆194Updated last year
- 2018年全国大学生信息安全竞赛作品赛一等奖☆32Updated 10 months ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Updated last month
- Maintain a list of open source libraries of cryptographic excellence☆62Updated last month
- Supplementary code and data to "Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning"☆76Updated 6 years ago
- ☆18Updated 6 years ago
- my ctf chals☆11Updated 6 months ago
- 基于全同态加密的安全人脸识别系统/Secure Face Recognition System based on Fully Homomorphic Encryption☆146Updated 2 years ago
- A framework for secure, handy, accurate, and fast transformer inference☆22Updated 4 months ago
- Code repository for the paper at USENIX Security'24☆35Updated last year
- An implementation of RSA extending Wiener attack☆16Updated 4 years ago
- Academic Cooperation Lab☆19Updated 3 months ago
- ☆15Updated last year
- ☆37Updated 2 years ago
- ☆35Updated 2 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆12Updated 5 years ago
- Code for the paper: Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions☆11Updated last year
- Homemade implementation of Square Attack against 4 rounds AES☆15Updated 5 years ago
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆173Updated 7 months ago
- ☆244Updated 2 years ago
- PPA attack code☆12Updated 3 years ago